An update for kernel is now available for Red Hat Enterprise Linux 5Extended Lifecycle Support.

Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.

Security Fix(es):

* The NFSv2 and NFSv3 server implementations in the Linux kernel through4.10.13 lacked certain checks for the end of a buffer. A remote attackercould trigger a pointer-arithmetic error or possibly cause otherunspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c andfs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)

Red Hat would like to thank Ari Kauppi for reporting this issue.

Bug Fix(es):

* When upgrading to kernel with the fix for stack guard flaw, a crash couldoccur in Java Virtual Machine (JVM) environments, which attempted toimplement their own stack guard page. With this update, the underlyingsource code has been fixed to consider the PROT_NONE mapping as a part ofthe stack, and the crash in JVM no longer occurs under the describedcircumstances. (BZ#1467938)

4. Solution:

For details on how to apply this update, which includes the changesdescribed in this advisory, refer to: